Udayakumar, 2023 - Google Patents
Design and deploy security for infrastructure, data, and applicationsUdayakumar, 2023
- Document ID
- 9986004318002921519
- Author
- Udayakumar P
- Publication year
- Publication venue
- Design and Deploy a Secure Azure Environment: Mapping the NIST Cybersecurity Framework to Azure Services
External Links
Snippet
Cybersecurity is essential in protecting systems from malicious attacks and unauthorized access. It also helps to ensure that data is kept safe and secure and that applications remain available and reliable. Without proper cybersecurity measures in place, organizations can …
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Tabrizchi et al. | A survey on security challenges in cloud computing: issues, threats, and solutions | |
| Akhtar et al. | A comprehensive overview of privacy and data security for cloud storage | |
| Borky et al. | Protecting information with cybersecurity | |
| Subashini et al. | A survey on security issues in service delivery models of cloud computing | |
| Mather et al. | Cloud security and privacy: an enterprise perspective on risks and compliance | |
| Fernandes et al. | Security issues in cloud environments: a survey | |
| US20240364689A1 (en) | Accessing Cloud Environments Through Administrative Tenancies To Comply With Sovereignty Requirements | |
| TAMER | Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks | |
| Roy et al. | A study on google cloud platform (gcp) and its security | |
| Soares et al. | Cloud security: state of the art | |
| Gurkok | Securing cloud computing systems | |
| Diogenes et al. | Microsoft Azure security center | |
| Bulusu et al. | A study on cloud computing security challenges | |
| Sailakshmi | Analysis of cloud security controls in aws, azure, and google cloud | |
| Ali et al. | Emerging trends in cloud computing paradigm: An extensive literature review on cloud security, service models, and practical suggestions | |
| Udayakumar | Design and deploy security for infrastructure, data, and applications | |
| Agrawal et al. | Cloud Computing Security: Strategies and Best Practices | |
| Lawrence et al. | Securing Kubernetes: A study on the measures for enhancing control and data plane security | |
| WO2024227197A1 (en) | Accessing cloud environments through administrative tenancies to comply with sovereignty requirements | |
| Udayakumar | Design and Deploy a Secure Azure Environment | |
| Yadav et al. | A comprehensive survey of IoT-based cloud computing cyber security | |
| Deshpande et al. | Optimization of security as an enabler for cloud services and applications | |
| Sandbu | Windows Ransomware Detection and Protection: Securing Windows Endpoints, the Cloud, and Infrastructure Using Microsoft Intune, Sentinel, and Defender | |
| Nahar et al. | Cloud computing and cloud security | |
| Pidlubnyi | Increasing Security and Reducing Risks Running Services in a Potential Containerized Environment While Meeting Regulatory Standards |